Fig. 7From: Binary phase hopping based spreading code authentication technique\({{\text{C}} \mathord{\left/ {\vphantom {{\text{C}} {\text{N}}}} \right. \kern-\nulldelimiterspace} {\text{N}}}_{{0}}\) degradationBack to article page